bug-bounty433
google352
xss348
microsoft280
facebook245
apple171
exploit160
rce156
malware97
account-takeover94
cve88
csrf82
writeup80
bragging-post78
browser77
privilege-escalation67
react59
authentication-bypass57
cloudflare54
dos53
docker51
ssrf51
node50
access-control47
aws47
phishing46
smart-contract45
oauth45
ethereum43
supply-chain43
web342
defi42
sql-injection41
lfi37
idor34
smart-contract-vulnerability32
clickjacking31
web-application31
race-condition31
reverse-engineering31
wordpress30
info-disclosure30
vulnerability-disclosure29
cloud28
burp-suite28
information-disclosure28
solidity27
web-security27
ctf26
responsible-disclosure26
0
8/10
vulnerability
A complete SSRF-to-RCE exploit chain on AWS Elastic Beanstalk that leverages the EC2 metadata service to extract IAM credentials, then uses those credentials to upload a PHP web shell to an accessible S3 bucket for remote code execution. The attack demonstrates how weak IAM policies can enable escalation from SSRF to full system compromise.
ssrf
rce
aws
elastic-beanstalk
metadata-service
ec2
s3
aws-cli
credential-extraction
file-upload
web-shell
privilege-escalation
cloud-security
iam-role-abuse
Youssef A. Mohamed
GeneralEG
CESPPA
Squnity
Synack
AWS Elastic Beanstalk
AWS Systems Manager
AWS CLI
169.254.169.254
aws-elasticbeanstalk-ec2-role
AWSElasticBeanstalkWebTier